Description
In the Linux kernel, the following vulnerability has been resolved:

btrfs: free pages on error in btrfs_uring_read_extent()

In this function the 'pages' object is never freed in the hopes that it is
picked up by btrfs_uring_read_finished() whenever that executes in the
future. But that's just the happy path. Along the way previous
allocations might have gone wrong, or we might not get -EIOCBQUEUED from
btrfs_encoded_read_regular_fill_pages(). In all these cases, we go to a
cleanup section that frees all memory allocated by this function without
assuming any deferred execution, and this also needs to happen for the
'pages' allocation.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak leading to possible Denial of Service
Action: Apply patch
AI Analysis

Impact

The vulnerability arises from an oversight in the btrfs file system’s URING read handler, where the pages buffer is not freed during error conditions. This can cause kernel memory to be held indefinitely, allowing an attacker who can trigger repeated read errors to deplete system memory and potentially crash or degrade the host. The weakness is a classic memory management flaw, documented as CWE‑772.

Affected Systems

The issue affects the Linux kernel, specifically the Btrfs subsystem in all kernel releases that lack the committed fix. No explicit version range is provided; any kernel still containing the pre‑fix code is susceptible.

Risk and Exploitability

With a CVSS score of 5.5, the severity is moderate, and the EPSS score is under 1 %, indicating a low likelihood of widespread exploitation. The flaw is not listed in the CISA KEV catalog. The attack vector is inferred to be a local or privileged user capable of inducing read errors on Btrfs volumes, as the memory leak occurs within kernel land.

Generated by OpenCVE AI on April 7, 2026 at 09:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that incorporates the fix for CVE‑2026‑23423. This will release the unfreed pages during error handling.
  • If an immediate kernel update is not feasible, apply the specific commit referenced in the provided links to the kernel source tree, rebuild, and reboot the system.
  • Monitor kernel memory usage for sustained increases that could indicate the presence of the leak, and isolate affected hosts until a patch is applied.

Generated by OpenCVE AI on April 7, 2026 at 09:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: btrfs: free pages on error in btrfs_uring_read_extent() In this function the 'pages' object is never freed in the hopes that it is picked up by btrfs_uring_read_finished() whenever that executes in the future. But that's just the happy path. Along the way previous allocations might have gone wrong, or we might not get -EIOCBQUEUED from btrfs_encoded_read_regular_fill_pages(). In all these cases, we go to a cleanup section that frees all memory allocated by this function without assuming any deferred execution, and this also needs to happen for the 'pages' allocation.
Title btrfs: free pages on error in btrfs_uring_read_extent()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T13:24:31.966Z

Reserved: 2026-01-13T15:37:46.015Z

Link: CVE-2026-23423

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T14:16:28.487

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-23423

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23423 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:54:14Z

Weaknesses